Attribute-based encryption for fine-grained access control of encrypted data
As more sensitive data is shared and stored by third-party sites on the Internet, there will be
a need to encrypt data stored at these sites. One drawback of encrypting data, is that it can …
a need to encrypt data stored at these sites. One drawback of encrypting data, is that it can …
Ciphertext-policy attribute-based encryption
In several distributed systems a user should only be able to access data if a user posses a
certain set of credentials or attributes. Currently, the only method for enforcing such policies …
certain set of credentials or attributes. Currently, the only method for enforcing such policies …
Machine learning based trust computational model for IoT services
The Internet of Things has facilitated access to a large volume of sensitive information on
each participating object in an ecosystem. This imposes many threats ranging from the risks …
each participating object in an ecosystem. This imposes many threats ranging from the risks …
Authorization in trust management: Features and foundations
Trust management systems are frameworks for authorization in modern distributed systems,
allowing remotely accessible resources to be protected by providers. By allowing providers …
allowing remotely accessible resources to be protected by providers. By allowing providers …
Semantic web policies–a discussion of requirements and research issues
PA Bonatti, C Duma, N Fuchs, W Nejdl… - The Semantic Web …, 2006 - Springer
Policies are pervasive in web applications. They play crucial roles in enhancing security,
privacy and usability of distributed services. There has been extensive research in the area …
privacy and usability of distributed services. There has been extensive research in the area …
Analyzing GDPR compliance through the lens of privacy policy
With the arrival of the European Union's General Data Protection Regulation (GDPR),
several companies are making significant changes to their systems to achieve compliance …
several companies are making significant changes to their systems to achieve compliance …
Access control and the resource description framework: A survey
In recent years we have seen significant advances in the technology used to both publish
and consume structured data using the existing web infrastructure, commonly referred to as …
and consume structured data using the existing web infrastructure, commonly referred to as …
[PDF][PDF] Security and trust issues in semantic grids
Grid computing allows sharing of services and resources accross institutions. However,
current Grid security mechanisms for authentication and authorization are too rigid and they …
current Grid security mechanisms for authentication and authorization are too rigid and they …
Driving and monitoring provisional trust negotiation with metapolicies
P Bonatti, D Olmedilla - … on Policies for Distributed Systems and …, 2005 - ieeexplore.ieee.org
We introduce the provisional trust negotiation framework PROTUNE, for combining
distributed trust management policies with provisional-style business rules and access …
distributed trust management policies with provisional-style business rules and access …
Peertrust: Automated trust negotiation for peers on the semantic web
Researchers have recently begun to develop and investigate policy languages to describe
trust and security requirements on the Semantic Web. Such policies will be one component …
trust and security requirements on the Semantic Web. Such policies will be one component …